{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:59:01Z","timestamp":1773615541935,"version":"3.50.1"},"reference-count":11,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.3103\/s0146411623080278","type":"journal-article","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T15:02:20Z","timestamp":1709218940000},"page":"914-921","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet"],"prefix":"10.3103","volume":"57","author":[{"given":"P. V.","family":"Semyanov","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"S. V.","family":"Grezina","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1627","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"7650_CR1","doi-asserted-by":"publisher","unstructured":"Housley, R., Cryptographic Message Syntax (CMS), RFC 5652, RFC Editor, 2009.https:\/\/doi.org\/10.17487\/rfc5652","DOI":"10.17487\/rfc5652"},{"key":"7650_CR2","unstructured":"Bitcoin Core integration\/staging tree. https:\/\/github.com\/bitcoin\/bitcoin. Cited December 21, 2020."},{"key":"7650_CR3","doi-asserted-by":"publisher","first-page":"1931","DOI":"10.3390\/sym12111931","volume":"12","author":"D. Zegzhda","year":"2020","unstructured":"Zegzhda, D., Lavrova, D., Pavlenko, E., and Shtyrkina, A., Cyber attack prevention based on evolutionary cybernetics approach, Symmetry, 2020, vol. 12, no. 11, p. 1931.https:\/\/doi.org\/10.3390\/sym12111931","journal-title":"Symmetry"},{"key":"7650_CR4","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.3390\/sym13122453","volume":"13","author":"D. Zegzhda","year":"2021","unstructured":"Zegzhda, D., Pavlenko, E., and Aleksandrova, E., Modelling artificial immunization processes to counter cyberthreats, Symmetry, 2021, vol. 13, no. 12, p. 2453. https:\/\/doi.org\/10.3390\/sym13122453","journal-title":"Symmetry"},{"key":"7650_CR5","doi-asserted-by":"publisher","first-page":"745","DOI":"10.3103\/s0146411615080118","volume":"49","author":"D.A. Moskvin","year":"2015","unstructured":"Moskvin, D.A. and Ivanov, D.V., Methods of protecting self-organizing networks against attacks on traffic routing, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 745\u2013750.https:\/\/doi.org\/10.3103\/s0146411615080118","journal-title":"Autom. Control Comput. Sci."},{"key":"7650_CR6","first-page":"95","volume":"17","author":"D.A. Moskvin","year":"2010","unstructured":"Moskvin, D.A. and Pechenkin, A.I., Detection and prevention of unallowed data transmission from a local network, Bezop. Inf. Tekhnol., 2010, vol. 17, no. 1, pp. 95\u201397.","journal-title":"Bezop. Inf. Tekhnol."},{"key":"7650_CR7","doi-asserted-by":"publisher","first-page":"978","DOI":"10.3103\/s0146411617080302","volume":"51","author":"D.P. Zegzhda","year":"2017","unstructured":"Zegzhda, D.P., Moskvin, D.A., and Dakhnovich, A.D., Protection of Wi-Fi network users against rogue access points, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 978\u2013984.https:\/\/doi.org\/10.3103\/s0146411617080302","journal-title":"Autom. Control Comput. Sci."},{"key":"7650_CR8","volume-title":"Scalar multiplication algorithms in a group of points of elliptic curve and some of their modifications, Radiotekhnika. Vesukr. Mezhved. Nauchn.-tekh. Sb. (Radioengineering: All-Ukrainian Interdepartmental Sci.-Tech. Collection of Papers)","author":"S.I. Zbitnev","year":"2005","unstructured":"Zbitnev, S.I., Kovtun, V.Yu., and Tevyashev, A.D., Scalar multiplication algorithms in a group of points of elliptic curve and some of their modifications, Radiotekhnika. Vesukr. Mezhved. Nauchn.-tekh. Sb. (Radioengineering: All-Ukrainian Interdepartmental Sci.-Tech. Collection of Papers), Kharkov: Kharkovsk. Nats. Univ. Radioelektron., 2005, vol. 141, pp. 82\u201396."},{"key":"7650_CR9","doi-asserted-by":"publisher","first-page":"39","DOI":"10.5120\/19028-0047","volume":"108","author":"N.F.H. Al Saffar","year":"2014","unstructured":"Al Saffar, N.F.H. and Said, M.R.Md., High performance methods of elliptic curve scalar multiplication, Int. J. Comput. Appl., 2014, vol. 108, no. 20, pp. 39\u201345.https:\/\/doi.org\/10.5120\/19028-0047","journal-title":"Int. J. Comput. Appl."},{"key":"7650_CR10","unstructured":"Leboeuf, K., GPU and ASIC acceleration of elliptic curve scalar point multiplication, PhD Thesis, Windsor, Canada, 2012: University of Windsor, 2012."},{"key":"7650_CR11","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/s13389-019-00211-9","volume":"9","author":"T. Wu","year":"2019","unstructured":"Wu, T. and Wang, R., Fast unified elliptic curve point multiplication for NIST prime curves on FPGAs, J. Cryptographic Eng., 2019, vol. 9, no. 4, pp. 401\u2013410.https:\/\/doi.org\/10.1007\/s13389-019-00211-9","journal-title":"J. Cryptographic Eng."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080278.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411623080278","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080278.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:20Z","timestamp":1773612080000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411623080278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":11,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["7650"],"URL":"https:\/\/doi.org\/10.3103\/s0146411623080278","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"30 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 April 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}